cve/2018/CVE-2018-19986.md

23 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-19986](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19986)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
In the /HNAP1/SetRouterSettings message, the RemotePort parameter is vulnerable, and the vulnerability affects D-Link DIR-818LW Rev.A 2.05.B03 and DIR-822 B1 202KRb06 devices. In the SetRouterSettings.php source code, the RemotePort parameter is saved in the $path_inf_wan1."/web" internal configuration memory without any regex checking. And in the IPTWAN_build_command function of the iptwan.php source code, the data in $path_inf_wan1."/web" is used with the iptables command without any regex checking. A vulnerable /HNAP1/SetRouterSettings XML message could have shell metacharacters in the RemotePort element such as the `telnetd` string.
### POC
#### Reference
- https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990
2024-06-09 00:33:16 +00:00
- https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990
2024-05-26 14:27:05 +02:00
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/SexyBeast233/SecBooks
- https://github.com/XinRoom/dir2md
- https://github.com/pr0v3rbs/FirmAE
- https://github.com/sinword/FirmAE_Connlab